A persistent cross-site scripting (XSS) vulnerability in the Snort Rules configuration of Juniper ATP may allow authenticated user to inject arbitrary script and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2019-0834 | A persistent cross-site scripting (XSS) vulnerability in the Snort Rules configuration of Juniper ATP may allow authenticated user to inject arbitrary script and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3. |
Fixes
Solution
The following software release have been updated to resolve this specific issue: 5.0.3 and all subsequent releases.
Workaround
There are no known workarounds for this issue, however limit the access to only trusted administrators from trusted administrative networks or hosts would minimize the risk.
References
Link | Providers |
---|---|
https://kb.juniper.net/JSA10918 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-17T00:21:24.078Z
Reserved: 2018-10-11T00:00:00
Link: CVE-2019-0027

No data.

Status : Modified
Published: 2019-01-15T21:29:01.917
Modified: 2024-11-21T04:16:04.823
Link: CVE-2019-0027

No data.

No data.